Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp3503327imm; Wed, 5 Sep 2018 00:57:35 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYbslG2TpztSe/kVEpM2spTKHaSSty0Y6bbbaqJHDQDKvxaicflq8JEvk9acJWLOPVBTA6Q X-Received: by 2002:a62:c9:: with SMTP id 192-v6mr38526325pfa.99.1536134255467; Wed, 05 Sep 2018 00:57:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536134255; cv=none; d=google.com; s=arc-20160816; b=rBgXaGvahijjAJbCr4dAIJyzIXXoLSAhy99uI29jFTmgMZLi2/EFWmDLSzvCf0guj0 4Sc/usJh57L0XiStXhfqiBzXa6D3ToEE8rLhJvrazXtKObYPrND2Riaoziv70xyQv+4P uiNJAihK1of9YqqQ+DQnxajI4ByJkCmIgi263Eee6nxqmj51AmkKY8aBF1+Ra7KrCI0A o/XUTWsm1HvJh2L5UcXXNxFze9FCeJeUruAsjEy6t+TMe2y9D6g6mOy7kX2WNY046J6k EZzHT/W3OUNZK3L4Gvk37P/M3sr+t78IspmRTudSJnyr5vFhxJUSCNlbr+ZtK/hLhahL ICFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=f0lKjRITn0BWi7NhhK70U79FALLhH0hPDFNk8ca9RGI=; b=Y7P7ArsLCsUx+twTneJy2/cLEA1fr2rDjRw3y2ne4deGSYSwuNYEkfxuvHcmQ2VnA6 lnSigQxyQX4mG0NmwIk8EEbaX8olsy4lhOgFK23TCVDGlDJyiDb8xvn7XbXbdIMmWIjM OWNO8GyPzaNfn7RnX3WLZY/mpb5WzmcBYuusoXl1lhc+mGuAQx8ygqXo+Jax/ofeGqkH HCK6eV9stq2wojqnU2MCfu5crPSGdqnc802Q1TRQNyZOhs8Ow5LC/PQu6Qkfi7FnsFQv arQFD/hcllZdTnBegym7mHGKTE8zIcVI4wnYDbTsf0WRnMSEVzKO/1au6iZMt4XHRwnk xG8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d30-v6si1321784pld.452.2018.09.05.00.57.19; Wed, 05 Sep 2018 00:57:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727821AbeIEMYg (ORCPT + 99 others); Wed, 5 Sep 2018 08:24:36 -0400 Received: from mx2.suse.de ([195.135.220.15]:49022 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727494AbeIEMYg (ORCPT ); Wed, 5 Sep 2018 08:24:36 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 349B2AD47; Wed, 5 Sep 2018 07:55:37 +0000 (UTC) Date: Wed, 5 Sep 2018 09:55:35 +0200 (CEST) From: Jiri Kosina To: Peter Zijlstra cc: Thomas Gleixner , Ingo Molnar , Josh Poimboeuf , Andrea Arcangeli , "Woodhouse, David" , Oleg Nesterov , Tim Chen , linux-kernel@vger.kernel.org, x86@kernel.org Subject: Re: [PATCH v3 2/3] x86/speculation: apply IBPB more strictly to avoid cross-process data leak In-Reply-To: <20180905075238.GN24124@hirez.programming.kicks-ass.net> Message-ID: References: <20180905075238.GN24124@hirez.programming.kicks-ass.net> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 5 Sep 2018, Peter Zijlstra wrote: > > if (tsk && tsk->mm && > > tsk->mm->context.ctx_id != last_ctx_id && > > - get_dumpable(tsk->mm) != SUID_DUMP_USER) > > + ___ptrace_may_access(current, tsk, PTRACE_MODE_IBPB)) > > indirect_branch_prediction_barrier(); > > See how the new (first) argument is 'current' and you could've just used > the old __ptrace_may_access(). Yeah, 1/3 is dropped in my current series already; this was cherry-picked from original Tim's series, but it is indeed superfluous. Thanks, -- Jiri Kosina SUSE Labs